CVE-2025-27380
Published: 22 January 2026
Summary
CVE-2025-27380 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Altium On-Prem Enterprise Server. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 3.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.
Validates web inputs to reject script-related content that could produce XSS.
Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS via HTML injection directly enables browser session hijacking to steal tokens/session data.
NVD Description
HTML injection in Project Release in Altium Enterprise Server (AES) 7.0.3 on all platforms allows an authenticated attacker to execute arbitrary JavaScript in the victim’s browser via crafted HTML content.
Deeper analysisAI
CVE-2025-27380 is an HTML injection vulnerability (CWE-79) in the Project Release component of Altium Enterprise Server (AES) version 7.0.3, affecting all supported platforms. Published on 2026-01-22, it has a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N). The flaw enables an authenticated attacker to inject crafted HTML content, leading to the execution of arbitrary JavaScript in the victim's browser.
An authenticated user with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L), though it requires user interaction (UI:R) from the victim. Successful exploitation changes the scope (S:C), resulting in high confidentiality impact (C:H) through cross-site scripting, allowing the attacker to steal sensitive data visible in the victim's browser session, such as session tokens or user information, while having limited integrity (I:L) and no availability (A:N) impact.
For mitigation details, refer to the Altium security advisory at https://www.altium.com/platform/security-compliance/security-advisories.
Details
- CWE(s)